3 Reasons to Protect Mobile Apps in the Remote Work Economy
15:47 - 23/02/2021
This year, remote work and social distancing have led people to rely on their mobile devices more than ever. According to App Annie, consumers spent 1.6 trillion hours on mobile in the first six months of 2020,
1. Defending Against Competitive Threats
As competition for users’ attention heats up, some competitors may look to nefarious tactics to gain market share for their mobile apps. For example, bad actors could scan for a lack of code hardening techniques to quickly select a list of targets for reverse-engineering. For static analysis attacks, malicious actors use disassemblers or decompilers to gain access to the code of applications and look for sensitive information, or parts of the app that are valuable for further analysis. The goal may be to exploit or modify the app in some way.
Business implications of these attacks could be severe. One scenario could be a competitor cloning entire apps or copying valuable logic, instead of developing his own solutions. This results in a loss of competitive advantage for the targeted party.
2. Protecting Apps Against Attacks at Runtime
Beyond static attacks alone, many attackers look to understand the ways in which an application works, or attempt to modify the app’s behavior at runtime. These are called dynamic analysis and runtime attacks. In this scenario, the attacker will initially run an app on a test device, where they may try to gain insight into its inner workings, and modify the way in which the application functions. They then may attempt to distribute or share modified apps. A lack of runtime application self-protection (RASP) mechanisms can make these attacks effortless to execute.
Dynamic analysis and runtime attacks can result in revenue losses or sensitive data loss. For example, an adversary could circumvent license checks to get premium content for free and distribute a modified app to a wider audience through 3rd party app stores. This piracy tactic is prominent in gaming, utility and media apps.
3. Extending Beyond App Store Defaults
Many app developers may not be aware that the default encryption and application signing mechanisms offered by the iOS and Android app stores are not enough to protect their applications against tampering and reverse-engineering.
For example, Apple’s system encrypts the code of applications submitted to the App Store. However, all applications must be decrypted before they can be executed. The decrypted instructions can be dumped from memory and reconverted into the original unencrypted application by a variety of tools available for jailbroken devices. That means that as long as an application can be installed and run on a jailbroken device, Apple’s code encryption will not prevent it from being reverse-engineered.
This is just one example of why the basics are not enough to protect mobile applications. Developers should take a layered approach to security to protect their applications against common attacks caused by reverse-engineering and tampering. A combination of code-hardening, RASP and real-time threat monitoring can address mobile app security throughout the development lifecycle.
With a proactive approach to security, development teams can secure the apps that drive the remote economy.
(Source: Guardsquare blog)
PHÂN TÍCH MÃ ĐỘC SAU SỰ CỐ XÂM NHẬP HỆ THỐNG BẢO MẬT DI ĐỘNG
QUẢN TRỊ BẢO MẬT THIẾT BỊ DI ĐỘNG TRONG THỜI ĐẠI KỶ NGUYÊN SỐ
4 THÁCH THỨC TRONG BẢO MẬT THIẾT BỊ DI ĐỘNG
TIỀM ẨN NGUY CƠ PHÁ HỦY BẢO MẬT DI ĐỘNG TỪ PHẦN MỀM ĐỘC HẠI